Vladislav Pokrovsky (ΞX.MI)

Organization: Independent AppSec Researcher

6
All Time Ranking
260
All Time Discoveries

About

AppSec // Bug Bounty // Legal Hacking

«When you lose fun and start doing things only for the payback, you're dead.» © Phrack #65

Showing 201-220 of 260 Vulnerabilities

Title CVE ID CVSS Vector Date
WP Google Maps Pro <= 8.1.11 - Authenticated Stored Cross-Site Scripting CVE-2021-36871 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N September 8, 2021
WordPress Popular Posts <= 5.3.3 - Authenticated (Admin+) Stored Cross-Site Scripting CVE-2021-36872 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N July 4, 2021
Async Javascript <= 2.20.12.09 - Authenticated (Admin+) Cross-Site Scripting 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N June 13, 2021
WP Reset <= 1.86 - Authenticated Stored Cross-Site Scripting via extra_data Parameter CVE-2021-24424 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N May 26, 2021
Related Posts for WordPress <= 2.0.4 - Stored Cross-Site Scripting CVE-2021-24482 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N May 17, 2021
Autoptimize <= 2.8.3 - Stored Cross-Site Scripting CVE-2021-24332 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N May 7, 2021
WP DoNotTrack <= 0.8.8 - Authenticated (Admin+) Stored Cross-Site Scripting 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N May 3, 2021
Rss for Yandex Turbo <= 1.30 - Admin+ Stored Cross-Site Scripting CVE-2021-24428 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N April 23, 2021
wpDiscuz <= 7.6.3 - Missing Authorization via AJAX actions CVE-2023-45760 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N October 12, 2023
Real Estate 7 <= 3.3.4 - Cross-Site Request Forgery 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L March 1, 2023
JS Help Desk <= 2.7.1 - Cross-Site Request Forgery CVE-2022-46842 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N January 27, 2023
Quiz And Survey Master <= 7.3.6 - Insecure Direct Object Reference CVE-2021-36906 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N October 21, 2022
Word Search Puzzles game <= 2.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36383 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N September 1, 2022
WHA Crossword <= 1.1.10 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2022-36365 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N September 1, 2022
Code Snippets Extended <= 1.4.7 - Cross-Site Request Forgery CVE-2022-29435 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L May 17, 2022
Psychological tests & quizzes <= 0.21.19 - Authenticated (Contributor+) Cross-Site Scripting CVE-2022-27854 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N April 26, 2022
Simple Ajax Chat <= 20220115 - Cross-Site Request Forgery CVE-2022-27850 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L April 15, 2022
WP MAPS – Easiest & Most Advanced WordPress Plugin for Google Maps <= 4.2.3 - Cross-Site Request Forgery CVE-2022-25600 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L February 22, 2022
Email Tracker <= 5.2.6 - Cross-Site Request Forgery CVE-2021-44777 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L November 1, 2021
Listing, Classified Ads & Business Directory – uListing <= 2.0.5 - Cross-Site Request Forgery CVE-2021-36876 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N July 27, 2021

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation